Encryption consists of converting information from its original understandable form to an alternative form that cannot be understood. For example, if we encrypt the sentence “next week we plan to occupy the parliament” we convert it into: MUcRWCDXCSVXtgT/dEium3P+Lym0K8FJS9FhOvQeCnQv5IjR8RUVKJ0Z7Hi4c1X
.
In order to encrypt information we need an encryption method and an encryption key. If a secure encryption method is used, the only way that anyone can decrypt the information back to its original form is if they have the decryption key. This is why encryption is so useful: because even though you can’t guarantee that others won’t access your information while it’s travelling through the internet or stored on a computer, if that information is encrypted, they won’t be able to access your original information; the only thing they’ll have is a useless encrypted information.
Thus, there are two aspects that you need to take into account when encrypting your information: